- DocumentoPrivacy in Medical Data Publishingcargado por
IJCSDF
- DocumentoGame Theorycargado por
IJCSDF
- DocumentoA Survey on Malware Propagation, Analysis, and Detectioncargado por
IJCSDF
- DocumentoA Detailed Strategy for Managing Corporation Cyber War Securitycargado por
IJCSDF
- DocumentoApplication of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplicationcargado por
IJCSDF
- DocumentoProduct Piracy Preventioncargado por
IJCSDF
- DocumentoSecure Model for Virtualization Layer in Cloud Infrastructurecargado por
IJCSDF
- DocumentoRationale and Design of the Access Specification Language RASPcargado por
IJCSDF
- DocumentoThe Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functionscargado por
IJCSDF
- DocumentoOn Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomiescargado por
IJCSDF
- DocumentoDomain Information Based Blacklisting Method for the Detection of Malicious Webpagescargado por
IJCSDF
- DocumentoAn Authentication Middleware for Prevention of Information Theftcargado por
IJCSDF
- DocumentoA Review on Impacts of Cloud Computing on Digital Forensicscargado por
IJCSDF
- DocumentoAssessing Database and Network Threats in Traditional and Cloud Computingcargado por
IJCSDF
- DocumentoThe Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanismscargado por
IJCSDF
- DocumentoDigital Forensic Trends and Futurecargado por
IJCSDF
- DocumentoA DRM Scheme Using File Physical Informationcargado por
IJCSDF
- DocumentoAn Analysis of Base Station Location Accuracy within Mobile-Cellular Networkscargado por
IJCSDF
- DocumentoAutomating the Generation of Fake Documents to Detect Network Intruderscargado por
IJCSDF
- DocumentoProposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shiftcargado por
IJCSDF
- DocumentoA Framework for Good Corporate Governance and Organisational Learning – An Empirical Studycargado por
IJCSDF
- DocumentoAutomated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)cargado por
IJCSDF
- DocumentoInvestigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Userscargado por
IJCSDF
- DocumentoAn Automated Malware Detection System for Android Using Behavior-Based Analysis AMDAcargado por
IJCSDF
- DocumentoComputer Forensics between the Italian Legislation and Pragmatic Questionscargado por
IJCSDF
- DocumentoTowards quantitative measures of Information Securitycargado por
IJCSDF
- DocumentoEPSILON2cargado por
IJCSDF
- DocumentoA Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with itcargado por
IJCSDF
- DocumentoA Privacy-Preserving Approach for Collecting Evidence in Forensic Investigationcargado por
IJCSDF
- DocumentoThe Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspacecargado por
IJCSDF
- DocumentoTrusted Document Signing Based on Use of Biometric (Face) Keyscargado por
IJCSDF
- DocumentoTechnical Security Metrics Model in Compliance with ISO/IEC 27001 Standardcargado por
IJCSDF
- DocumentoSecurity Measurement Based On GQM To Improve Application Security During Requirements Stagecargado por
IJCSDF
- DocumentoSecure Network Communication Based on Text-to-Image Encryptioncargado por
IJCSDF
- DocumentoModelling Based Approach for Reconstructing Evidence of VOIP Malicious Attackscargado por
IJCSDF
- DocumentoA Survey on Privacy Issues in Digital Forensicscargado por
IJCSDF
- DocumentoMitigating Man-In-The-Browser Attacks with Hardware-based Authentication Schemecargado por
IJCSDF
- DocumentoData Leak, Critical Information Infrastructure and the Legal Optionscargado por
IJCSDF
- DocumentoEnhancing Advanced Encryption Standard S-Box Generation Based on Round Keycargado por
IJCSDF
- DocumentoAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Methodcargado por
IJCSDF
- DocumentoTrust Measurements Yeld Distributed Decision Support in Cloud Computingcargado por
IJCSDF
- DocumentoThe Right to Consent and Control Personal Information Processing in Cyberspacecargado por
IJCSDF
- DocumentoEfficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysiscargado por
IJCSDF
- DocumentoRuntime Monitoring Technique to handle Tautology based SQL Injection Attackscargado por
IJCSDF
- DocumentoCertificate Revocation Management in VANETcargado por
IJCSDF
- DocumentoGenetic Algorithm Approach for Risk Reduction of Information Securitycargado por
IJCSDF
- DocumentoFinite Field Arithmetic Architecture Based on Cellular Arraycargado por
IJCSDF
- DocumentoA New ShiftColumn Transformationcargado por
IJCSDF
- DocumentoSophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advancedcargado por
IJCSDF